US11317338B2 - Access control method and apparatus - Google Patents
Access control method and apparatus Download PDFInfo
- Publication number
- US11317338B2 US11317338B2 US16/829,884 US202016829884A US11317338B2 US 11317338 B2 US11317338 B2 US 11317338B2 US 202016829884 A US202016829884 A US 202016829884A US 11317338 B2 US11317338 B2 US 11317338B2
- Authority
- US
- United States
- Prior art keywords
- access control
- terminal device
- coverage area
- control mode
- configuration information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active, expires
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/02—Access restriction performed under specific conditions
- H04W48/06—Access restriction performed under specific conditions based on traffic conditions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/02—Access restriction performed under specific conditions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W28/00—Network traffic management; Network resource management
- H04W28/02—Traffic management, e.g. flow control or congestion control
- H04W28/0231—Traffic management, e.g. flow control or congestion control based on communication conditions
- H04W28/0236—Traffic management, e.g. flow control or congestion control based on communication conditions radio quality, e.g. interference, losses or delay
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/16—Discovering, processing access restriction or access information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/08—Access restriction or access information delivery, e.g. discovery data delivery
- H04W48/12—Access restriction or access information delivery, e.g. discovery data delivery using downlink control channel
Definitions
- Embodiments of this application relate to the communications technologies, and in particular, to an access control method and an apparatus.
- Machine type communication is machine-to-machine (M2M) communication, and is a technology of transmitting data from one terminal to another terminal.
- M2M machine-to-machine
- an electronic device having a wireless access capability may directly access a wireless network by using a subscriber identity module/universal subscriber identity module (SIM/USIM) card, or may access the wireless network by relaying by one gateway device in a manner such as Bluetooth or Zigbee, thereby implementing communication with an MTC server or another device.
- SIM/USIM subscriber identity module/universal subscriber identity module
- MTC communication does not focus on data transmission rates, or multiband, multi-antenna, and full-duplex transmission, and instead, focuses on longer battery life of the terminal apparatus and lower costs of the terminal apparatus, that is, the terminal is required to implement low power consumption ( ) and low costs.
- a terminal of the MTC type for example, a water meter or an electricity meter
- a signal coverage strength of the terminal cannot meet a requirement of signal reception. Therefore, the MTC is enhanced, so that a base station and the terminal can support coverage enhancement.
- a main method for implementing the coverage enhancement is to repeatedly send uplink signals or downlink signals for a plurality of times, and a success rate of data reception is improved through reception and combination for a plurality of times.
- a larger quantity of times of repeated transmission indicates more consumed time-frequency resources.
- the enhanced coverage is divided into different levels, and different enhanced coverage levels correspond to different quantities of times of repeated transmission.
- an enhanced coverage level is relatively high, a larger quantity of times of repeated transmission are required, and more resources are consumed. Due to a relatively large deployment number of terminals of the MTC type, network congestion is caused if a network accepts connection setup requests from all terminals in a short period of time.
- Embodiments of this application provide an access control method and an apparatus, to prevent terminal devices in a network from impacting on the network when the terminal devices simultaneously access the network, to reduce network congestion.
- an embodiment of this application provides an access control method, including: receiving, by a terminal device, access control configuration information sent by a network device, where the access control configuration information is used to indicate an access control mode corresponding to at least one coverage area; determining, by the terminal device, a coverage area of the terminal device; and determining, by the terminal device, the access control mode of the terminal device based on the access control configuration information and the coverage area of the terminal device.
- the access control configuration information includes at least one piece of access control mode information, where the access control mode information corresponds to the at least one coverage area; and the determining, by the terminal device, the access control mode of the terminal device based on the access control configuration information and the coverage area of the terminal device includes: obtaining, by the terminal device, access control mode information corresponding to the coverage area of the terminal device from the at least one piece of access control mode information, and determining the access control mode of the terminal device based on the access control mode information corresponding to the coverage area of the terminal device.
- the access control configuration information further includes at least one probability factor
- the method further includes: determining, by the terminal device, an access probability based on the coverage area corresponding to the terminal device and the at least one probability factor; and determining, by the terminal device based on the access probability, whether to perform the access control mode.
- the determining, by the terminal device based on the access probability, whether to perform the access control mode includes: obtaining, by the terminal device, a first random number, and when the first random number is greater than the access probability, determining to perform the access control mode, and when the first random number is not greater than the access probability, determining to skip performing the access control mode; or
- the access control configuration information includes at least one probability factor
- the determining, by the terminal device, the access control mode of the terminal device based on the access control configuration information and the coverage area of the terminal device includes: determining, by the terminal device, an access probability based on the coverage area corresponding to the terminal device and the at least one probability factor; and determining, by the terminal device, the access control mode of the terminal device based on the access probability.
- the determining, by the terminal device, the access control mode of the terminal device based on the access probability includes: obtaining, by the terminal device, a second random number, and when the second random number is greater than the access probability, determining that the access control mode is a first access control mode, and when the second random number is not greater than the access probability, determining that the access control mode is a second access control mode; or obtaining, by the terminal device, a second random number, and when the second random number is less than the access probability, determining that the access control mode is a first access control mode, and when the second random number is not less than the access probability, determining that the access control mode is a second access control mode.
- the access control mode includes accessing a current cell, entering a preset access control process, camping on the current cell, skipping accessing the current cell, skipping entering the preset access control process, or skipping camping on the current cell
- the preset access control process includes any one or more of an extended access barring EAB process, a service specific access control SSAC process, an access class barring ACB process, or an application specific access control ACDC process
- the first access control mode and the second access control mode are any two access control modes.
- “Any one of x, y or z” refers to x, to y, to z or any combination thereof throughout this specification.
- the first access control mode and the second access control mode may be two access control modes set in the terminal device, and the terminal device may determine one of the two as the access control mode of the terminal device based on the access control configuration information sent by the network device.
- the method when the access control mode of the terminal device is the skipping accessing the current cell, the method further includes: starting, by the terminal device, a timer, and notifying a non-access stratum that the current cell is barred from being accessed; or when the access control mode of the terminal device is the skipping camping on the current cell, the method further includes: performing, by the terminal device, cell reselection.
- the receiving, by a terminal device, access control configuration information sent by a network device includes: receiving, by the terminal device, system information sent by the network device, where the system information carries the access control configuration information, and the system information is one of the following information types: a system information block SIB 2, a system information block SIB 14, a system information block SIB 1, and a master information block MIB.
- the method further includes: receiving, by the terminal device, an indication message sent by the network device, where the indication message is used to indicate that the access control configuration information is already updated or to be updated; and obtaining, by the terminal device, updated access control configuration information based on the indication message.
- the indication message includes one piece of bit information
- the obtaining, by the terminal device, updated access control configuration information based on the indication message includes: obtaining, by the terminal device, the updated access control configuration information based on the one piece of bit information; or
- the indication message includes M pieces of bit information, where M is a quantity of pieces of the at least one piece of access control mode information, and each piece of bit information corresponds to one piece of the access control mode information
- the obtaining, by the terminal device, updated access control configuration information based on the indication message includes: obtaining, by the terminal device, bit information of the terminal device from the M pieces of bit information; determining, based on the bit information of the terminal device, whether the access control mode information of the terminal device is already updated or to be updated; and obtaining, by the terminal device, the updated access control configuration information when the access control mode information of the terminal device is updated or to be updated, where the bit information of the terminal device is a bit corresponding to the access control mode information corresponding to the coverage area of the terminal device; or
- the indication message includes N pieces of bit information, where N is a quantity of the at least one coverage area, and each piece of bit information corresponds to one coverage area
- the obtaining, by the terminal device, updated access control configuration information based on the indication message includes: obtaining, by the terminal device, bit information corresponding to the coverage area of the terminal device from the N pieces of bit information; determining, based on the bit information corresponding to the coverage area of the terminal device, whether the access control mode information corresponding to the coverage area of the terminal device is already updated or to be updated; and obtaining, by the terminal device, the updated access control configuration information when the access control mode information corresponding to the coverage area of the terminal device is already updated or to be updated.
- an embodiment of this application provides an access control method, including: determining, by a network device, access control configuration information, where the access control configuration information is used to indicate an access control mode corresponding to at least one coverage area; and sending, by the network device, the access control configuration information to a terminal device, where the access control configuration information is used to determine the access control mode of the terminal device.
- the access control configuration information includes at least one piece of access control mode information, the access control mode information corresponds to the at least one coverage area, the access control mode information is used to indicate the access control mode corresponding to the at least one coverage area corresponding to the access control mode information, and the at least one piece of access control mode information is used to determine the access control mode of the terminal device.
- the access control configuration information further includes at least one probability factor, the at least one probability factor is used to determine an access probability of the terminal device, and the access probability is used to determine whether to perform the access control mode of the terminal device.
- the access control configuration information includes at least one probability factor, the at least one probability factor is used to determine an access probability of the terminal device, and the access probability is used to determine the access control mode of the terminal device.
- the access control mode includes accessing a current cell, entering a preset access control process, skipping accessing the current cell, camping on the current cell, skipping camping on the current cell, or skipping entering the preset access control process, where the preset access control process includes any one or more of an extended access barring EAB process, a service specific access control SSAC process, an access class barring ACB process, or an application specific access control ACDC process.
- the sending, by the network device, the access control configuration information to a terminal device includes: sending, by the network device, the access control configuration information to the terminal device by using system information, where the system information is one of the following information types: a system information block SIB 2, a system information block SIB 14, a system information block SIB 1, or a master information block MIB.
- system information is one of the following information types: a system information block SIB 2, a system information block SIB 14, a system information block SIB 1, or a master information block MIB.
- the method further includes: sending, by the network device, an indication message to the terminal device, where the indication message is used to indicate that the access control configuration information is already updated or to be updated, and the indication message is carried in a paging message and/or system information.
- the indication message includes one piece of bit information, where the bit information is used to indicate that the access control configuration information is already updated or to be updated; or
- the indication message includes M pieces of bit information, where M is a quantity of pieces of the at least one piece of access control mode information, each piece of bit information corresponds to one piece of access control mode information, and each piece of bit information is used to indicate that the access control mode information corresponding to the bit information is already updated or to be updated; or
- the indication message includes N pieces of bit information, where N is a quantity of the at least one coverage area, each piece of bit information corresponds to one coverage area, and each piece of bit information is used to indicate that access control information corresponding to the coverage area corresponding to the bit information is already updated or to be updated.
- an embodiment of this application provides an apparatus.
- the apparatus may be a terminal device, or a part on a structure of a terminal device, or may be an apparatus that is structurally independent of a terminal device, and the apparatus has a function of implementing behaviors of the terminal device according to the first aspect or any one of the implementations of the first aspect.
- the function may be implemented by using hardware, or may be implemented by hardware by executing corresponding software.
- the hardware or software includes one or more modules corresponding to the foregoing function.
- an embodiment of this application provides an apparatus.
- the apparatus may be a terminal device, or a part on a structure of a terminal device, or may be an apparatus that is structurally independent of a terminal device.
- the apparatus includes: a processor, a memory, a bus, and a communications interface, where the memory is configured to store a computer executable instruction, the processor is connected to the memory by using the bus, and when the terminal device runs, the processor executes the computer executable instruction stored in the memory, to enable the terminal device to perform the access control method according to the first aspect or any one of the implementations of the first aspect.
- an embodiment of this application provides a computer-readable storage medium, configured to store a computer software instruction used by the terminal device, where when the computer software instruction is run on a computer, the computer is enabled to perform the access control method according to the first aspect or any one of the implementations of the first aspect.
- an embodiment of this application provides a computer program product including an instruction, where when the computer program product is run on a computer, the computer is enabled to perform the access control method according to the first aspect or any one of the implementations of the first aspect.
- an embodiment of this application provides an apparatus.
- the apparatus may be a network device, or a part on a structure of a network device, or may be an apparatus that is structurally independent of a network device, and the apparatus has a function of implementing behaviors of the network device according to the second aspect or any one of the implementations of the second aspect.
- the function may be implemented by using hardware, or may be implemented by hardware by executing corresponding software.
- the hardware or software includes one or more modules corresponding to the foregoing function.
- an embodiment of this application provides an apparatus.
- the apparatus may be a network device, or a part on a structure of a network device, or may be an apparatus that is structurally independent of a network device.
- the apparatus includes: a processor, a memory, a bus, and a communications interface, where the memory is configured to store a computer executable instruction, the processor is connected to the memory by using the bus, and when the network device runs, the processor executes the computer executable instruction stored in the memory, to enable the network device to perform the access control method according to the second aspect or any one of the implementations of the second aspect.
- an embodiment of this application provides a computer-readable storage medium, configured to store a computer software instruction used by the network device, where when the computer software instruction is run on a computer, the computer is enabled to perform the access control method according to the second aspect or any one of the implementations of the second aspect.
- an embodiment of this application provides a computer program product including an instruction, where when the computer program product is run on a computer, the computer is enabled to perform the access control method according to the second aspect or any one of the implementations of the second aspect.
- an embodiment of this application provides a chip, including: a memory and a processor, where
- the memory is configured to store a program instruction
- the processor is configured to invoke the program instruction stored in the memory, to implement the access control method according to the first aspect or any one of the implementations of the first aspect.
- an embodiment of this application provides a chip, including: a memory and a processor, where
- the memory is configured to store a program instruction
- the processor is configured to invoke the program instruction stored in the memory, to implement the access control method according to the second aspect or any one of the implementations of the second aspect.
- an embodiment of this application provides a storage medium, including: a readable storage medium and a computer program, and the computer program is configured to implement the access control method according to the first aspect or any one of the implementations of the first aspect.
- an embodiment of this application provides a storage medium, including: a readable storage medium and a computer program, and the computer program is configured to implement the access control method according to the second aspect or any one of the implementations of the second aspect.
- an embodiment of this application provides a program product, the program product includes a computer program, the computer program is stored in a readable storage medium, at least one processor of a communications device may read the computer program from the readable storage medium, and the at least one processor executes the computer program to enable the communications device to perform the access control method according to the first aspect or any one of the implementations of the first aspect.
- an embodiment of this application provides a program product, the program product includes a computer program, the computer program is stored in a readable storage medium, at least one processor of a communications device may read the computer program from the readable storage medium, and the at least one processor executes the computer program to enable the communications device to perform the access control method according to the second aspect or any one of the implementations of the second aspect.
- the network device sends the access control configuration information to the terminal device, where the access control configuration information is used to indicate the access control mode information corresponding to the at least one coverage area; and the terminal device determines the access control mode of the terminal device based on the access control configuration information and the coverage area of the terminal device, to perform corresponding operations by using the access control mode of the terminal device, thereby preventing the terminal devices in a network from impacting on the network when the terminal devices simultaneously access the network, to reduce network congestion.
- FIG. 1 is a schematic diagram of an application scenario of an access control method according to an embodiment of this application
- FIG. 2 is a flowchart of an access control method according to an embodiment of this application.
- FIG. 3 is a flowchart of another access control method according to an embodiment of this application.
- FIG. 4 is a flowchart of another access control method according to an embodiment of this application.
- FIG. 5 is a flowchart of another access control method according to an embodiment of this application.
- FIG. 6 is a flowchart of another access control method according to an embodiment of this application.
- FIG. 7 is a flowchart of still another access control method according to an embodiment of this application.
- FIG. 8 is a flowchart of yet another access control method according to an embodiment of this application.
- FIG. 9 is a flowchart of yet another access control method according to an embodiment of this application.
- FIG. 10 is a flowchart of yet another access control method according to an embodiment of this application.
- FIG. 11 is a schematic structural diagram of a terminal device according to an embodiment of this application.
- FIG. 12 is a schematic structural diagram of another terminal device according to an embodiment of this application.
- FIG. 13 is a schematic structural diagram of a chip according to an embodiment of this application.
- FIG. 14 is a schematic structural diagram of a network device according to an embodiment of this application.
- FIG. 15 is a schematic structural diagram of another network device according to an embodiment of this application.
- FIG. 16 is a schematic structural diagram of another chip according to an embodiment of this application.
- FIG. 1 is a schematic diagram of an application scenario of an access control method according to an embodiment of this application.
- the access control method of this application may specifically be applied to a long term evolution (LTE) communications system.
- LTE long term evolution
- a terminal device accesses a core network through an evolved NodeB (eNB), and a base station provides a radio resource management function, a function of organizing and sending a paging message, a function of organizing and sending a broadcast message, and the like.
- eNB evolved NodeB
- a base station provides a radio resource management function, a function of organizing and sending a paging message, a function of organizing and sending a broadcast message, and the like.
- an access control mode may be configured for terminal devices within different coverage areas, to enable the terminal devices to access a network by using the access control mode configured by the base station, thereby preventing the terminal devices in the network from impacting on the network when the terminal devices simultaneously access the network, to reduce network congestion.
- the access control method of this application may also be applied to a 5G communications system, and correspondingly, the eNB is replaced with a distributed unit (DU) or a centralized unit (CU).
- the access control method may further be applied to any suitable communications system, and the network device and the terminal device are a network side device and a terminal side device in the corresponding communications system.
- the network device in this application may be specifically a wireless access device, for example, may be an eNB, a DU, a CU, a NodeB, a gNB in a future communications system or an access node in a Wi-Fi system.
- the specific technology used by the network device and a specific device form are not limited in the embodiments of this application.
- the terminal device in this application may be specifically a wireless access device, for example, may also be referred to as a terminal, user equipment (UE), a mobile station (MS), or a mobile terminal (MT).
- the terminal device may be a mobile phone, a tablet computer (such as a Pad), a computer having a wireless transmission and receiving function, a machine type communication (MTC) terminal, a virtual reality (VR) terminal, an augmented reality (AR) terminal, a wireless terminal in industrial control, a wireless terminal in self driving, a wireless terminal in a remote medical surgery, a wireless terminal in transportation safety, a wireless terminal in a smart city, a wireless terminal in a smart home, or the like.
- MTC machine type communication
- VR virtual reality
- AR augmented reality
- the MTC terminal is an electronic device that uses the MTC technology, and the electronic device supports low power consumption, low complexity and coverage enhancement.
- the electronic device may be a wireless terminal in a smart grid, such as an electricity meter, or may be a water meter.
- the MTC technology is a communications technology introduced by third generation partnership project (3GPP) in evolution of an LTE technology for the development of Internet of Things (Internet of Things, IoT), and is specifically used for communication of an electronic device with low power consumption and low costs.
- 3GPP third generation partnership project
- IoT Internet of Things
- the network device and the terminal device of this application may be deployed on land, including an indoor or outdoor device, a handheld device, or an in-vehicle device; or may be deployed on water; or may be deployed in air, for example, on an air plane, a balloon, or a man-made satellite.
- Application scenarios of the network device and the terminal device are not limited in the embodiments of this application.
- the “coverage area” in this application is specifically an area in which a strength of a reference signal satisfies a condition.
- the strength of a reference signal of the network device measured by the terminal device in this area satisfies the condition, and the condition may be flexibly set based on a requirement. Selection under different conditions may divide the coverage area of the network device into one or more coverage areas, and the divided coverage area is used as an access control granularity, to perform access control on the terminal in the coverage area of the network device.
- the condition may be a strength range of the reference signal, and when the strength of the reference signal measured by the terminal device is within the strength range, the coverage area is a coverage area of the terminal device.
- the strength of the reference signal may be specifically reference signal received power (RSRP), may be reference signal received quality (RSRQ), or may be a reference signal to interference plus noise ratio (SINR), and certainly, or may be other measurement quantity. Examples are not listed one by one herein.
- the reference signal (RS) is a “pilot” signal, and is a known signal provided by a transmit end to a receive end for channel estimation or channel sounding.
- a network device may serve as the transmit end, and a terminal device may serve as the receive end.
- the “coverage area” of an MTC terminal device may be coverage areas corresponding to one or more coverage enhancement (CE) levels.
- CE coverage enhancement
- the “access control mode” in this application may be used to instruct the terminal device to access a current cell, enter a preset access control process, camp on the current cell, skip accessing the current cell, skip entering the preset access control process, or skip camping on the current cell. It should be noted herein that, specific behaviors of the terminal device instructed by the access control mode may vary based on different scenarios or implementations, and this is not specifically limited herein.
- the preset access control process includes any one or more of an extended access barring EAB process, a service specific access control SSAC process, an access class barring ACB process, or an application specific access control ACDC process.
- FIG. 2 is a flowchart of an access control method according to an embodiment of this application. This embodiment relates to a network device and a terminal device. As shown in FIG. 2 , the method in this embodiment may include the following steps.
- Step 101 The network device determines access control configuration information, where the access control configuration information is used to indicate an access control mode corresponding to at least one coverage area.
- the network device may determine the access control configuration information based on a load status of the network device, and a manner of determining the access control configuration information may be flexibly set based on an access control requirement of a network.
- the access control configuration information may be used to indicate access control modes corresponding to one or more coverage areas.
- the access control modes corresponding to different coverage areas may be the same, or may be different.
- the network device may configure the access control modes for terminal devices located within different coverage areas by using the access control configuration information, so that the terminal device may access the network by using the access control mode corresponding to the coverage to which the terminal device belongs to.
- Step 102 The network device sends the access control configuration information to the terminal device, and the terminal device receives the access control configuration information sent by the network device.
- the access control configuration information is used to determine the access control mode of the terminal device.
- the network device may send the access control configuration information in a broadcast manner, and a specific message that carries the access control configuration information may be flexibly set based on a requirement.
- Step 103 The terminal device determines a coverage area of the terminal device.
- the terminal device determines the coverage area of the terminal device based on a measured signal strength of the network device.
- Step 104 The terminal device determines the access control mode of the terminal device based on the access control configuration information and the coverage area of the terminal device.
- the access control mode of the terminal device may be any one of the access control modes described above. For specific descriptions, refer to the foregoing descriptions, and details are not described herein again. Then the terminal device performs corresponding operations based on the access control mode of the terminal device. In this way, the access control configuration information is sent to the terminal device, so that the terminal device determines the access control mode corresponding to the coverage area of the terminal device.
- the network device indicates the access control mode corresponding to the at least one coverage area by using the access control configuration information.
- One implementation is a direct indication manner.
- the access control configuration information may include at least one piece of access control mode information, the access control mode information corresponds to the at least one coverage area, the access control mode information is used to indicate the access control mode corresponding to the at least one coverage area corresponding to the access control mode information, and the at least one piece of access control mode information is used to determine the access control mode of the terminal device.
- the other implementation is an indirect indication manner.
- the access control configuration information includes at least one probability factor, the at least one probability factor is used to determine an access probability of the terminal device, and the access probability is used to determine the access control mode of the terminal device.
- the access control mode in this application may specifically be set in many different manners.
- the access control mode includes accessing a current cell or entering a preset access control process. Specifically, the terminal device determines, based on the access control configuration information and the coverage area of the terminal device, the access control mode of the terminal device as accessing the current cell or entering the preset access control process. When the access control mode of the terminal device is accessing the current cell, the terminal device may request to access the network device. When the access control mode of the terminal device is entering the preset access control process, the terminal device may enter the preset access control process, to further determine whether the access is barred.
- the access control mode includes entering the preset access control process, or skipping accessing the current cell.
- the terminal device determines, based on the access control configuration information and the coverage area of the terminal device, the access control mode of the terminal device as skipping accessing the current cell or entering the preset access control process.
- the terminal device may start a timer, and the terminal device may notify, on an radio resource control (RRC) layer, a non-access stratum (NAS) that accessing the network device is restricted.
- RRC radio resource control
- NAS non-access stratum
- the terminal device no longer requests to access the network device.
- the terminal device may enter the preset access control process, to further determine whether the access is barred.
- the access control mode includes accessing the current cell or skipping accessing the current cell.
- the terminal device determines, based on the access control configuration information and the coverage area of the terminal device, the access control mode of the terminal device as accessing the current cell or skipping accessing the current cell.
- the terminal device may request to access the network device.
- the terminal device may start a timer, and the terminal device may notify, on an RRC layer, a NAS layer that accessing the network device is restricted. During the operation of the timer, on the RRC layer, the terminal device no longer requests to access the network device.
- the access control mode includes camping on the current cell or skipping camping on the current cell. Specifically, the terminal device determines, based on the access control configuration information and the coverage area of the terminal device, the access control mode of the terminal device as camping on the current cell or skipping camping on the current cell. When the access control mode of the terminal device is camping on the current cell, the terminal device may camp on the cell of the current network device, and request to access the network device. When the access control mode of the terminal device is skipping camping on the current cell, the terminal device reselects a cell of a network device to camp on, and no longer camps on the cell of the current network device.
- a value “0” of the bit indicates one access control mode in any one of the foregoing implementations
- a value “1” of the bit indicates another access control mode.
- the access control mode includes accessing the current cell or entering the preset access control process.
- the value “0” of the bit indicates accessing the current cell
- the value “1” of the bit indicates entering the preset access control process
- the value “0” of the bit indicates entering the preset access control process
- the value “1” of the bit indicates accessing the current cell.
- the preset access control process may specifically include any one or more of an extended access barring (EAB) process, a service specific access control (SSAC) process, an access class barring (ACB) process, or an application specific access control (ACDC) process.
- EAB extended access barring
- SSAC service specific access control
- ACB access class barring
- ACDC application specific access control
- a specific implementation of step 102 may be that the network device broadcasts system information, and the system information carries the access control configuration information.
- the system information may be one of the following information types: a system information block SIB 2, a system information block SIB 14, a system information block SIB 1, or a master information block MIB.
- the network device sends the access control configuration information to the terminal device, where the access control configuration information is used to indicate the access control mode corresponding to the at least one coverage area; and the terminal device determines the access control mode of the terminal device based on the access control configuration information and the coverage area of the terminal device, to perform corresponding operations by using the access control mode of the terminal device, thereby preventing the terminal devices in a network from impacting on the network when the terminal devices simultaneously access the network, to reduce network congestion.
- FIG. 3 is a flowchart of another access control method according to an embodiment of this application.
- the access control configuration information is described in detail in a direct indication manner.
- the method in this embodiment may include the following steps.
- Step 201 A network device determines access control configuration information, where the access control configuration information includes at least one piece of access control mode information, and the access control mode information corresponds to at least one coverage area.
- the access control configuration information may include the at least one piece of access control mode information, the access control mode information corresponds to the at least one coverage area, the access control mode information is used to indicate an access control mode corresponding to the at least one coverage area corresponding to the access control mode information, and the at least one piece of access control mode information is used to determine the access control mode of the terminal device.
- a correspondence between the coverage area and the access control mode information may be specifically: in one implementation, the coverage area is in a one-to-one correspondence with the access control mode information, that is, each coverage area corresponds to one piece of access control mode information; and in another implementation, the coverage area is in a many-to-one correspondence with the access control mode information, that is, a plurality of coverage areas correspond to one piece of the access control mode information.
- the correspondence may be flexibly set based on a requirement.
- each coverage area corresponds to one piece of access control mode information, so that access control modes of coverage areas are mutually independent, and access control modes of a plurality of coverage areas are set in a more flexible way.
- a plurality of coverage areas correspond to one piece of access control mode information, so that resources occupied by the access control configuration information may be reduced.
- the at least one piece of access control mode information may be specifically a bitstring, or may be a bitmap (bitmap), that is, one piece of access control mode information may be one bit.
- a length of the access control configuration information may be flexibly set based on an access control requirement. For example, a bit is set to correspond to one coverage area, then a quantity of bits of the access control configuration information is the same as a quantity of the coverage areas, and each bit is used to indicate an access control mode within one coverage area.
- a bit may alternatively be set to correspond to two coverage areas. Examples are not listed one by one herein.
- one piece of access control mode information may alternatively be a plurality of bits, for example, three bits, and every three bits are used to indicate the access control mode within the at least one coverage area.
- the quantity of bits may be flexibly set based on a requirement.
- the at least one piece of access control mode information may be specifically a list, in other words, one piece of access control mode information may be a parameter carried in a line of the list, and the terminal device may determine the access control mode indicated by the line based on the parameter. For example, a line is set to correspond to one coverage area, then a quantity of lines in the list of the access control configuration information is the same as a quantity of the coverage areas, and each line is used to indicate an access control mode within one coverage area. Certainly, it may be understood that a line may alternatively be set to correspond to two coverage areas. Examples are not listed one by one herein.
- the at least one coverage area is pre-configured at least one coverage area.
- the network device may pre-configure the at least one coverage area, in other words, the coverage area of the network device is divided in advance, and the terminal device is notified of a condition under which each coverage area meets a signal strength, so that the terminal device may determine, based on the signal strength measured by the terminal device, the coverage area of the terminal device.
- the at least one coverage area is dynamically indicated by the network device to the terminal device.
- the access control configuration information may further include coverage area information that is used to indicate the at least one coverage area, and the coverage area information is used to indicate the division of the coverage area to the terminal device.
- the access control configuration information further includes n measurement values, and the n measurement values are used to indicate n+1 coverage areas.
- the access control configuration information further includes three measurement values, respectively, a1, a2, and a3, and the three measurement values indicate four coverage areas, respectively, a coverage area 1, a coverage area 2, a coverage area 3, and a coverage area 4, where a signal measurement result of the coverage area 1 is less than a1, a signal measurement result of the coverage area 2 is greater than or equal to a1 and is less than a2, a signal measurement result of the coverage area 3 is greater than or equal to a2 and is less than a3, and a signal measurement result of the coverage area 4 is greater than or equal to a4.
- the network device may flexibly adjust coverage area division in a network based on an access control requirement.
- the coverage area information may specifically include at least one RSRP value, for example, the a1, the a2, and the a3 are all RSRP values.
- Step 202 The network device sends the access control configuration information to the terminal device, and the terminal device receives the access control configuration information sent by the network device.
- Step 203 The terminal device determines a coverage area of the terminal device.
- Step 204 The terminal device obtains access control mode information corresponding to the coverage area of the terminal device from the at least one piece of access control mode information, and determines an access control mode of the terminal device based on the access control mode information corresponding to the coverage area of the terminal device.
- the access control configuration information is 0101, where the first digit corresponds to the coverage area 1, the second digit corresponds to the coverage area 2, and based on the correspondence, the fourth digit corresponds to the coverage area 4.
- the terminal device belongs to the coverage area 1, and then the terminal device obtains a value of the first digit of the access control configuration information, that is, 0, and “0” indicates skipping camping on the current cell. Therefore, the terminal device determines the access control mode of the terminal device as skipping camping on the current cell.
- the network device sends the access control configuration information to the terminal device, where the access control configuration information includes the at least one piece of access control mode information; and the terminal device determines the access control mode of the terminal device based on the at least one piece of access control mode information and the coverage area of the terminal device, to perform corresponding operations by using the access control mode of the terminal device, thereby reducing load of the network device based on the coverage area, and preventing terminal devices in a network from impacting on the network when the terminal devices simultaneously access the network, to reduce network congestion.
- the access control configuration information includes the at least one piece of access control mode information
- the terminal device determines the access control mode of the terminal device based on the at least one piece of access control mode information and the coverage area of the terminal device, to perform corresponding operations by using the access control mode of the terminal device, thereby reducing load of the network device based on the coverage area, and preventing terminal devices in a network from impacting on the network when the terminal devices simultaneously access the network, to reduce network congestion.
- FIG. 4 is a flowchart of another access control method according to an embodiment of this application.
- the access control configuration information may further include at least one probability factor, the at least one probability factor is used to determine an access probability of the terminal device, and the access probability is used to determine whether to perform the access control mode of the terminal device.
- the method in this embodiment may include the following steps.
- Step 301 A network device determines access control configuration information, where the access control configuration information includes at least one piece of access control mode information and at least one possibility factor.
- step 201 For specific descriptions of the at least one piece of access control mode information, refer to step 201 in the embodiment shown in FIG. 3 , and details are not described herein again.
- Step 302 The network device sends the access control configuration information to the terminal device, and the terminal device receives the access control configuration information sent by the network device.
- Step 303 The terminal device determines a coverage area of the terminal device.
- Step 304 The terminal device obtains access control mode information corresponding to the coverage area of the terminal device from the at least one piece of access control mode information, and determines an access control mode of the terminal device based on the access control mode information corresponding to the coverage area of the terminal device.
- step 304 For specific descriptions of step 304 , refer to step 204 in the embodiment shown in FIG. 3 , and details are not described herein again.
- Step 305 The terminal device determines an access probability based on the coverage area corresponding to the terminal device and the at least one probability factor.
- Step 306 The terminal device determines, based on the access probability, whether to perform the access control mode.
- step 306 may be that: the terminal device obtains a first random number, and when the first random number is greater than the access probability, the terminal device determines to perform the access control mode, and when the first random number is not greater than the access probability, the terminal device determines to skip performing the access control mode.
- step 306 may be that: the terminal device obtains a first random number, and when the first random number is less than the access probability, the terminal device determines to perform the access control mode, and when the first random number is not less than the access probability, the terminal device determines to skip performing the access control mode.
- One implementation in which the terminal device obtains the first random number may be that the terminal device generates the first random number, and another implementation may be that the terminal device obtains the first random number from another apparatus or module, and a specific implementation may be flexibly set based on a requirement.
- step 305 may be that: the terminal device may determine the access probability based on reference signal received power RSRP measured by the terminal device and at least one probability factor.
- the terminal device may determine the access probability based on a formula (1).
- p is the access probability
- q is the reference signal received power RSRP or reference signal received quality RSRQ measured by the terminal device
- ⁇ k n ,k n-1 ,k n-2 , . . . , k 0 ⁇ is the at least one probability factor
- n+1 is a quantity of the at least one probability factor
- n is any natural number.
- the network device sends the access control configuration information to the terminal device, where the access control configuration information includes the at least one piece of access control mode information and the at least one probability factor; and the terminal device determines the access control mode of the terminal device based on the at least one piece of access control mode information and the coverage area of the terminal device, and the terminal device further determines, based on the at least one probability factor, whether to perform the access control mode, thereby reducing load of the network device based on the coverage area, and preventing terminal devices in a network from impacting on the network when the terminal devices simultaneously access the network, to reduce network congestion.
- terminal devices within a same coverage area may implement different access control by using the at least one probability factor.
- RSRP used for calculation in this application may be replaced with RSRQ, SINR or another measurement quantity, and examples are not listed one by one herein.
- FIG. 5 is a flowchart of another access control method according to an embodiment of this application.
- access control configuration information is described in detail in an indirect indication manner.
- the method in this embodiment may include the following steps.
- Step 401 A network device determines access control configuration information, where the access control configuration information includes at least one probability factor.
- the at least one probability factor is used to determine an access probability of a terminal device, and the access probability is used to determine an access control mode of the terminal device.
- Step 402 The network device sends the access control configuration information to the terminal device, and the terminal device receives the access control configuration information sent by the network device.
- Step 403 The terminal device determines a coverage area of the terminal device.
- Step 404 The terminal device determines the access probability based on the coverage area corresponding to the terminal device and the at least one probability factor.
- the terminal device may determine the access probability based on reference signal received power RSRP measured by the terminal device and the at least one probability factor.
- the terminal device may determine the access probability based on the formula (1).
- the reference signal received power RSRP measured by the terminal device is related to the coverage area corresponding to the terminal device.
- Step 405 The terminal device determines the access control mode of the terminal device based on the access probability.
- step 405 may be that: the terminal device obtains a second random number, and when the second random number is greater than the access probability, the terminal device determines that the access control mode is a first access control mode, and when the second random number is not greater than the access probability, the terminal device determines that the access control mode is a second access control mode.
- step 404 may be that: the terminal device obtains a second random number, and when the second random number is less than the access probability, the terminal device determines that the access control mode is a first access control mode, and when the second random number is not less than the access probability, the terminal device determines that the access control mode is a second access control mode.
- the first access control mode and the second access control mode are any two access control modes described above.
- the first access control mode may be accessing a current cell
- the second access control mode may be entering a preset access control process.
- the first access control mode and the second access control mode may be two access control modes set in the terminal device, and the terminal device may determine one of the two as the access control mode of the terminal device by using the access control configuration information sent by the network device.
- One implementation in which the terminal device obtains the second random number may be that the terminal device generates the second random number, and another implementation may be that the terminal device obtains the second random number from another apparatus or module, and a specific implementation may be flexibly set based on a requirement.
- the network device sends the access control configuration information to the terminal device, where the access control configuration information includes the at least one probability factor; and the terminal device determines the access control mode of the terminal device based on the at least one probability factor and the coverage area of the terminal device, to perform corresponding operations by using the access control mode of the terminal device, thereby reducing load of the network device based on the coverage area, and preventing terminal devices in a network from impacting on the network when the terminal devices simultaneously access the network, to reduce network congestion.
- FIG. 6 is a flowchart of another access control method according to an embodiment of this application.
- the access control configuration information sent by the network device
- performing corresponding operations by the terminal device is described in detail. Description is provided by using an example in which the access control mode is accessing a current cell or entering a preset access control process.
- the method in this embodiment may include the following steps.
- the access control mode of the terminal device in this embodiment is specifically an access control mode corresponding to a coverage area of the terminal device.
- Step 501 The terminal device receives, on an RRC layer, a connection setup request sent by a NAS layer.
- the terminal device sends the connection setup request on the NAS layer.
- Step 502 The terminal device determines the access control mode of the terminal device on the RRC layer based on the access control configuration information and the coverage area of the terminal device.
- the terminal device When receiving the connection setup request sent by the NAS layer, the terminal device performs detection on the access control mode that is based on the coverage area. Specifically, the terminal device determines the access control mode corresponding to the coverage area of the terminal device based on the access control configuration information and the coverage area of the terminal device.
- the specific implementation may use a specific implementation of the step in any one of the foregoing embodiments, and details are not described herein again.
- Step 503 When the access control mode of the terminal device is accessing the current cell, the terminal device requests to access a network device on the RRC layer.
- Step 504 When the access control mode of the terminal device is entering a preset access control process, the terminal device performs the preset access control process.
- the network device sends the access control configuration information to the terminal device, and the terminal device determines the access control mode of the terminal device based on the access control configuration information and the coverage area of the terminal device, to perform corresponding operations by using the access control mode of the terminal device, thereby reducing load of the network device based on the coverage area, and preventing terminal devices in a network from impacting on the network when the terminal devices simultaneously access the network, to reduce network congestion.
- FIG. 7 is a flowchart of still another access control method according to an embodiment of this application.
- the access control configuration information sent by the network device
- performing corresponding operations by the terminal device is described in detail. Description is provided by using an example in which the access control mode is skipping accessing a current cell or entering a preset access control process.
- the method in this embodiment may include the following steps.
- the access control mode of the terminal device in this embodiment is specifically an access control mode corresponding to a coverage area of the terminal device.
- Step 601 The terminal device receives, on an RRC layer, a connection setup request sent by a NAS layer.
- the terminal device sends the connection setup request on the NAS layer.
- Step 602 The terminal device determines the access control mode of the terminal device on the RRC layer based on the access control configuration information and the coverage area of the terminal device.
- the terminal device When receiving the connection setup request sent by the NAS layer, the terminal device performs detection on the access control mode that is based on the coverage area. Specifically, the terminal device determines the access control mode corresponding to the coverage area of the terminal device based on the access control configuration information and the coverage area of the terminal device.
- the specific implementation may use a specific implementation of the step in any one of the foregoing embodiments, and details are not described herein again.
- Step 603 When the access control mode of the terminal device is skipping accessing the current cell, the terminal device starts a timer, and notifies the NAS layer that access is barred, and during the operation of the timer, on the RRC layer, the terminal device no longer requests to access a network device.
- the terminal device notifies, on the RRC layer, the NAS layer that the access is barred, and may further notify the NAS layer of a reason why the access is barred, and the reason why the access is barred may be limitation by the coverage area.
- the RRC layer notifies the NAS layer that the barring is canceled, and the NAS layer may send a connection setup request to the RRC layer again.
- Step 604 When the access control mode of the terminal device is entering the preset access control process, the terminal device performs the preset access control process.
- the network device sends the access control configuration information to the terminal device, and the terminal device determines the access control mode of the terminal device based on the access control configuration information and the coverage area of the terminal device, to perform corresponding operations by using the access control mode of the terminal device, thereby reducing load of the network device based on the coverage area, and preventing terminal devices in a network from impacting on the network when the terminal devices simultaneously access the network, to reduce network congestion.
- the access control mode in this embodiment is skipping accessing the current cell or entering the preset access control process, and terminal devices within some coverage areas are directly barred from access, thereby reducing load of the network device in a quicker and more effective way.
- FIG. 8 is a flowchart of yet another access control method according to an embodiment of this application.
- the access control configuration information sent by the network device
- performing corresponding operations by the terminal device is described in detail. Description is provided by using an example in which the access control mode is accessing a current cell or skipping accessing the current cell.
- the method in this embodiment may include the following steps.
- the access control mode of the terminal device in this embodiment is specifically an access control mode corresponding to a coverage area of the terminal device.
- Step 701 The terminal device receives, on an RRC layer, a connection setup request sent by a NAS layer.
- the terminal device sends the connection setup request on the NAS layer.
- Step 702 The terminal device determines the access control mode of the terminal device on the RRC layer based on the access control configuration information and the coverage area of the terminal device.
- the terminal device When receiving the connection setup request sent by the NAS layer, the terminal device performs detection on the access control mode that is based on the coverage area. Specifically, the terminal device determines the access control mode corresponding to the coverage area of the terminal device based on the access control configuration information and the coverage area of the terminal device.
- the specific implementation may use a specific implementation of the step in any one of the foregoing embodiments, and details are not described herein again.
- Step 703 When the access control mode of the terminal device is skipping accessing the current cell, the terminal device starts a timer, and notifies the NAS layer that access is barred, and during the operation of the timer, on the RRC layer, the terminal device no longer requests to access a network device.
- the terminal device notifies, on the RRC layer, the NAS layer that the access is barred, and may further notify the NAS layer of a reason why the access is barred, and the reason why the access is barred may be limitation by the coverage area.
- the RRC layer notifies the NAS layer that the barring is canceled, and the NAS layer may send a connection setup request to the RRC layer again.
- Step 704 When the access control mode of the terminal device is accessing the current cell, the terminal device requests, on the RRC layer, to access the network device.
- the access control method in this embodiment may be performed after any one or more of the existing EAB process, SSAC process, ACB process, or ACDC process.
- the access control method of this embodiment is then performed.
- the network device sends the access control configuration information to the terminal device, and the terminal device determines the access control mode of the terminal device based on the access control configuration information and the coverage area of the terminal device, to perform corresponding operations by using the access control mode of the terminal device, thereby reducing load of the network device based on the coverage area, and preventing terminal devices in a network from impacting on the network when the terminal devices simultaneously access the network, to reduce network congestion.
- FIG. 9 is a flowchart of yet another access control method according to an embodiment of this application.
- the access control configuration information sent by the network device
- performing corresponding operations by the terminal device is described in detail. Description is provided by using an example in which the access control mode is camping on a current cell or skipping camping on the current cell.
- the method in this embodiment may include the following steps.
- the access control mode of the terminal device in this embodiment is specifically an access control mode corresponding to a coverage area of the terminal device.
- Step 801 The terminal device receives, on an RRC layer, a connection setup request sent by a NAS layer.
- the terminal device sends the connection setup request on the NAS layer.
- Step 802 The terminal device determines the access control mode of the terminal device on the RRC layer based on the access control configuration information and the coverage area of the terminal device.
- the terminal device When receiving the connection setup request sent by the NAS layer, the terminal device performs detection on the access control mode that is based on the coverage area. Specifically, the terminal device determines the access control mode corresponding to the coverage area of the terminal device based on the access control configuration information and the coverage area of the terminal device.
- the specific implementation may use a specific implementation of the step in any one of the foregoing embodiments, and details are not described herein again.
- Step 803 When the access control mode of the terminal device is skipping camping on the current cell, the terminal device reselects a cell of a network device to camp on.
- Step 804 When the access control mode of the terminal device is camping on the current cell, the terminal device camps on the cell of the current network device, and requests to access the network device.
- the access control configuration information in this embodiment may be specifically sent by using the SIB 1.
- the terminal device may not read the SIB 2, thereby reducing power consumption of the terminal device.
- the network device sends the access control configuration information to the terminal device, where the access control configuration information is used to indicate that the access control mode of the terminal device is camping on the current cell or skipping camping on the current cell.
- the access control configuration information is used to indicate that the access control mode of the terminal device is camping on the current cell or skipping camping on the current cell.
- FIG. 10 is a flowchart of yet another access control method according to an embodiment of this application.
- the network device may further send an indication message to the terminal device, and the indication message is used to indicate that the access control configuration information is already updated or to be updated.
- the method in this embodiment may specifically include the following steps.
- Step 901 The network device sends the indication message to the terminal device, and the terminal device receives the indication message sent by the network device.
- the indication message is used to indicate that the access control configuration information is already updated or to be updated, and the indication message may be carried in a paging message and/or system information.
- the network device after the access control configuration information of the network device changes, the network device sends the indication message to the terminal device, and the terminal device reads updated access control configuration information in the system information based on the indication message.
- the network device when the access control configuration information of the network device is to be changed, the network device sends the indication message to the terminal device, and the terminal device re-reads updated access control configuration information in the system information based on the indication message. In this way, the power consumption of the terminal device is reduced.
- Step 902 The terminal device obtains updated access control configuration information based on the indication message.
- the indication message is carried in a paging message.
- the network device may send the paging message to the terminal device, and the paging message carries the indication message.
- the terminal device learns that the access control configuration information is already updated or to be updated, so that the terminal device re-reads the system information, to obtain the updated access control configuration information.
- the indication message includes one piece of bit information, and the one piece of bit information is used to indicate that the access control configuration information is already updated or to be updated.
- one implementation of step 902 may be that: the terminal device obtains the updated access control configuration information based on the one piece of bit information.
- the indication message includes M pieces of bit information, where M is a quantity of pieces of the at least one piece of access control mode information, each piece of bit information corresponds to one piece of access control mode information, and each piece of bit information is used to indicate that the access control mode information corresponding to the bit information is already updated or to be updated, where M is any integer.
- step 902 may be that: the terminal device obtains the bit information of the terminal device from the M pieces of bit information, and determines, based on the bit information of the terminal device, whether the access control mode information of the terminal device is already updated or to be updated; and the terminal device obtains the updated access control configuration information when the access control mode information of the terminal device is updated or to be updated, where the bit information of the terminal device is a bit corresponding to the access control mode information corresponding to the coverage area of the terminal device.
- the indication message includes N pieces of bit information, where N is a quantity of the at least one coverage area, each piece of bit information corresponds to one coverage area, and each piece of bit information is used to indicate that access control information corresponding to the coverage area corresponding to the bit information is already updated or to be updated, where N is any integer.
- step 902 may be that: the terminal device obtains the bit information corresponding to the coverage area of the terminal device from the N pieces of bit information, and determines, based on the bit information corresponding to the coverage area of the terminal device, whether the access control mode information corresponding to the coverage area of the terminal device is already updated or to be updated; and the terminal device obtains the updated access control configuration information when the access control mode information corresponding to the coverage area of the terminal device is already updated or to be updated.
- the network device sends the access control configuration information to the terminal device, where the access control configuration information is used to indicate the access control mode corresponding to the at least one coverage area; and the terminal device determines the access control mode of the terminal device based on the access control configuration information and the coverage area of the terminal device, to perform corresponding operations by using the access control mode of the terminal device, thereby preventing terminal devices in a network from impacting on the network when the terminal devices simultaneously access the network, to reduce network congestion.
- the network device may send the indication message to the terminal device, so that the terminal device promptly obtains the updated access control configuration information based on the indication message, to implement flexible adjustment on the access control mode of the terminal device in the network.
- the access control apparatus in this application may be a terminal device, or may be a network device, configured to implement the access control method in the foregoing embodiments.
- the methods or the steps performed by the terminal device may alternatively be implemented by a chip inside the terminal device.
- the methods or the steps performed by the network device may alternatively be implemented by a chip inside the network device.
- FIG. 11 is a schematic structural diagram of a terminal device according to an embodiment of this application. As shown in FIG. 11 , the terminal device in this embodiment includes: a receiving module 11 and a processing module 12 .
- the receiving module 11 is configured to receive access control configuration information sent by a network device, where the access control configuration information is used to indicate an access control mode corresponding to at least one coverage area.
- the processing module 12 is configured to: determine a coverage area of the terminal device, and determine the access control mode of the terminal device based on the access control configuration information and the coverage area of the terminal device.
- the access control configuration information includes at least one piece of access control mode information, where the access control mode information corresponds to the at least one coverage area; and the processing module 12 is configured to: obtain access control mode information corresponding to the coverage area of the terminal device from the at least one piece of access control mode information, and determine the access control mode of the terminal device based on the access control mode information corresponding to the coverage area of the terminal device.
- the access control configuration information further includes at least one probability factor
- the processing module 12 is further configured to: determine an access probability based on the coverage area corresponding to the terminal device and the at least one probability factor; and determine, based on the access probability, whether to perform the access control mode.
- the processing module 12 is configured to: obtain a first random number, and when the first random number is greater than the access probability, determine to perform the access control mode, and when the first random number is not greater than the access probability, determine to skip performing the access control mode; or obtain a first random number, and when the first random number is less than the access probability, determine to perform the access control mode, and when the first random number is not less than the access probability, determine to skip performing the access control mode.
- the access control configuration information includes at least one probability factor
- the processing module 12 is configured to: determine an access probability based on the coverage area corresponding to the terminal device and the at least one probability factor; and determine the access control mode of the terminal device based on the access probability.
- p is the access probability
- q is reference signal received power RSRP or reference signal received quality RSRQ measured by the terminal device
- ⁇ k n , k n-1 ,k n-2 , . . . , k 0 ⁇ is the at least one probability factor
- n is any natural number.
- the processing module 12 is configured to: obtain a second random number, and when the second random number is greater than the access probability, determine that the access control mode is a first access control mode, and when the second random number is not greater than the access probability, determine that the access control mode is a second access control mode; or obtain a second random number, and when the second random number is less than the access probability, determine that the access control mode is a first access control mode, and when the second random number is not less than the access probability, determine that the access control mode is a second access control mode.
- the access control mode includes accessing a current cell, entering a preset access control process, camping on the current cell, skipping accessing the current cell, skipping entering the preset access control process, or skipping camping on the current cell, where the preset access control process includes any one or more of an extended access barring EAB process, a service specific access control SSAC process, an access class barring ACB process, or an application specific access control ACDC process, and
- the first access control mode and the second access control mode are any two access control modes.
- the processing module 12 when the access control mode of the terminal device is the skipping accessing the current cell, the processing module 12 is further configured to: start a timer, and notify a non-access stratum that the current cell is barred from being accessed; or
- the processing module 12 is further configured to perform cell reselection.
- the receiving module 11 is further configured to receive an indication message sent by the network device, where the indication message is used to indicate that the access control configuration information is already updated or to be updated;
- the processing module 12 is further configured to obtain updated access control configuration information based on the indication message.
- the indication message includes one piece of bit information
- the processing module 12 is configured to: obtain updated access control configuration information based on the one piece of bit information; or
- the indication message includes M pieces of bit information, where M is a quantity of pieces of the at least one piece of access control mode information, and each piece of bit information corresponds to one piece of access control mode information
- the processing module 12 is configured to: obtain bit information of the terminal device from the M pieces of bit information; determine, based on the bit information of the terminal device, whether the access control mode information of the terminal device is already updated or to be updated; and obtain the updated access control configuration information when the access control mode information of the terminal device is updated or to be updated, where the bit information of the terminal device is a bit corresponding to the access control mode information corresponding to the coverage area of the terminal device; or
- the indication message includes N pieces of bit information, where N is a quantity of the at least one coverage area, and each piece of bit information corresponds to one coverage area
- the processing module 12 is configured to: obtain bit information corresponding to the coverage area of the terminal device from the N pieces of bit information; determine, based on the bit information corresponding to the coverage area of the terminal device, whether the access control mode information corresponding to the coverage area of the terminal device is already updated or to be updated; and obtain the updated access control configuration information when the access control mode information corresponding to the coverage area of the terminal device is already updated or to be updated.
- the terminal device in this embodiment may further include a sending module 13 , configured to send information or a message to another device.
- the terminal device in this embodiment may be configured to perform technical solutions performed by the terminal device or a chip of the terminal device in the foregoing method embodiments, the implementation principles and technical effects thereof are similar, and for functions of the modules, refer to corresponding descriptions in the method embodiments, and details are not described herein again.
- FIG. 12 is a schematic structural diagram of another terminal device according to an embodiment of this application. As shown in FIG. 12 , the terminal device in this embodiment includes: a receiver 21 and a processor 22 .
- the receiving module 11 may be the receiver 21 in this embodiment.
- the receiver 21 may alternatively correspond to a transceiver.
- the terminal device may further include a transmitter 23 .
- the sending module 13 may be the transmitter 23 in this embodiment, and the transmitter 23 may alternatively correspond to a transceiver.
- the processing module 12 may be embedded in or independent of the processor 22 of the terminal device in a hardware form.
- the receiver 21 may include a necessary radio frequency communications device such as a frequency mixer.
- the processor 22 may include at least one of a central processing unit (CPU), a digital signal processor (DSP), a microcontroller (MCU), an application-specific integrated circuit (ASIC), or a field programmable gate array (FPGA).
- CPU central processing unit
- DSP digital signal processor
- MCU microcontroller
- ASIC application-specific integrated circuit
- FPGA field programmable gate array
- the terminal device in this embodiment may further include a memory 24 , the memory 24 is configured to store a program instruction, and the processor 22 is configured to invoke the program instruction in the memory 24 to perform the foregoing solutions.
- the program instruction may be implemented in a form of a software functional unit and can be sold or used as an independent product, and the memory 24 may be a computer-readable storage medium in any form. Based on such an understanding, all or some of the technical solutions of this application may be implemented in a form of a software product.
- the software product includes several instructions for instructing a computer device, which may be specifically the processor 22 , to perform all or some of the steps of the terminal device in the embodiments of this application.
- the foregoing computer-readable storage medium includes: any medium that can store program code, such as a USB flash drive, a removable hard disk, a read-only memory (Read-Only Memory, ROM), a random access memory (Random Access Memory, RAM), a magnetic disk, or an optical disc.
- the terminal device in this embodiment may be configured to perform technical solutions performed by the terminal device or a chip of the terminal device in the foregoing method embodiments, the implementation principles and technical effects thereof are similar, and for functions of the devices, refer to corresponding descriptions in the method embodiments, and details are not described herein again.
- FIG. 13 is a schematic structural diagram of a chip according to an embodiment of this application.
- the chip in this embodiment may be a chip of a terminal device, and the chip in this embodiment may include: a memory 31 and a processor 32 .
- the memory 31 is communicatively connected to the processor 32 .
- the chip may further include another structure or unit that forms a chip, for example, an interface or a slot. This is not limited herein.
- the receiving module 11 , the processing module 12 , and the sending module 13 may be embedded in or independent of the processor 32 of the chip in a hardware form.
- the memory 31 is configured to store a program instruction
- the processor 32 is configured to invoke the program instruction in the memory 31 , to perform the foregoing solutions.
- the chip in this embodiment may be configured to perform technical solutions performed by the terminal device or a chip inside the terminal device in the foregoing method embodiments of this application, the implementation principles and technical effects thereof are similar, and for functions of the modules, refer to corresponding descriptions in the method embodiments, and details are not described herein again.
- FIG. 14 is a schematic structural diagram of a network device according to an embodiment of this application.
- the network device in this embodiment may include: a processing module 41 and a sending module 42 .
- the processing module 41 is configured to determine access control configuration information, where the access control configuration information is used to indicate an access control mode corresponding to at least one coverage area.
- the sending module 42 is configured to send the access control configuration information to a terminal device, where the access control configuration information is used to determine the access control mode of the terminal device.
- the access control configuration information includes at least one piece of access control mode information, the access control mode information corresponds to the at least one coverage area, the access control mode information is used to indicate the access control mode corresponding to the at least one coverage area corresponding to the access control mode information, and the at least one piece of access control mode information is used to determine the access control mode of the terminal device.
- the access control configuration information includes at least one probability factor, the at least one probability factor is used to determine an access probability of the terminal device, and the access probability is used to determine the access control mode of the terminal device.
- the access control mode includes accessing a current cell, entering a preset access control process, skipping accessing the current cell, camping on the current cell, skipping camping on the current cell, or skipping entering the preset access control process, where
- the preset access control process includes any one or more of an extended access barring EAB process, a service specific access control SSAC process, an access class barring ACB process, or an application specific access control ACDC process.
- the sending module 42 is further configured to send an indication message to the terminal device, where the indication message is used to indicate that the access control configuration information is already updated or to be updated, and the indication message is carried in a paging message and/or system information.
- the indication message includes one piece of bit information, and the one piece of bit information is used to indicate that the access control configuration information is already updated or to be updated; or
- the indication message includes M pieces of bit information, where M is a quantity of pieces of the at least one piece of access control mode information, each piece of bit information corresponds to one piece of access control mode information, and each piece of bit information is used to indicate that the access control mode information corresponding to the bit information is already updated or to be updated; or
- the indication message includes N pieces of bit information, where N is a quantity of the at least one coverage area, each piece of bit information corresponds to one coverage area, and each piece of bit information is used to indicate that access control information corresponding to the coverage area corresponding to the bit information is already updated or to be updated.
- the network device in this embodiment may further include a receiving module 43 , configured to send information or a message to another device.
- the network device in this embodiment may be configured to perform technical solutions performed by the network device or a chip of the network device in the foregoing method embodiments, the implementation principles and technical effects thereof are similar, and for functions of the modules, refer to corresponding descriptions in the method embodiments, and details are not described herein again.
- FIG. 15 is a schematic structural diagram of another network device according to an embodiment of this application. As shown in FIG. 15 , the network device in this embodiment includes: a processor 51 and a transmitter 52 .
- the processing module 41 may be embedded in or independent of the processor 51 of the network device in a hardware form.
- the sending module 42 may be the transmitter 52 in this embodiment.
- the transmitter 52 may alternatively correspond to a transceiver.
- the network device may further include a receiver 53
- the receiving module 43 may be the receiver 53 in this embodiment, and the receiver 53 may alternatively correspond to a transceiver.
- the transmitter 52 may include a necessary radio frequency communications device such as a frequency mixer.
- the processor 51 may include at least one of a CPU, a DSP, an MCU, an ASIC, or an FPGA.
- the network device in this embodiment may further include a memory 54 , the memory 54 is configured to store a program instruction, and the processor 51 is configured to invoke the program instruction in the memory 54 , to perform the foregoing solutions.
- the network device in this embodiment may be configured to perform technical solutions performed by the network device or a chip of the network device in the foregoing method embodiments, the implementation principles and technical effects thereof are similar, and for functions of the devices, refer to corresponding descriptions in the method embodiments, and details are not described herein again.
- FIG. 16 is a schematic structural diagram of another chip according to an embodiment of this application.
- the chip in this embodiment may be a chip of the network device, and the chip in this embodiment may include: a memory 61 and a processor 62 .
- the memory 61 is communicatively connected to the processor 62 .
- the processor 62 may include, for example, at least one of a CPU, a DSP, an MCU, an ASIC, or an FPGA.
- the chip may further include another structure or unit that forms a chip, for example, an interface or a slot. This is not limited herein.
- the receiving module 43 , the processing module 41 , and the sending module 42 may be embedded in or independent of the processor 62 of the chip in a hardware form.
- the memory 61 is configured to store a program instruction
- the processor 62 is configured to invoke the program instruction in the memory 61 , to perform the foregoing solutions.
- the program instruction may be implemented in a form of a software functional unit and can be sold or used as an independent product, and the memory may be a computer-readable storage medium in any form. Based on such an understanding, all or some of the technical solutions of this application may be implemented in a form of a software product.
- the software product includes several instructions for instructing a computer device, which may be specifically the processor 62 , to perform all or some of the steps of the network device in the embodiments of this application.
- the foregoing computer-readable storage medium includes any medium that can store program code, such as a USB flash drive, a removable hard disk, a ROM, a RAM, a magnetic disk, or an optical disc.
- the chip in this embodiment may be configured to perform technical solutions performed by the network device or a chip inside the network device in the foregoing method embodiments of this application, the implementation principles and technical effects thereof are similar, and for functions of the modules, refer to corresponding descriptions in the method embodiments, and details are not described herein again.
- module division in the embodiments of this application is an example and is merely a logical function division. During actual implementation, another division manner may be used.
- Functional modules in the embodiments of this application may be integrated into one processing module, or each of the modules may exist alone physically, or two or more modules are integrated into one module.
- the integrated module may be implemented in a form of hardware, or may be implemented in a form of a software functional module.
- the integrated module When the integrated module is implemented in the form of a software functional module and sold or used as an independent product, the integrated module may be stored in a computer-readable storage medium.
- the software product is stored in a storage medium and includes several instructions for instructing a computer device (which may be a personal computer, a server, a network device, or the like) or a processor to perform all or some of the steps of the methods described in the embodiments of this application.
- the foregoing storage medium includes any medium that can store program code, such as a USB flash drive, a removable hard disk, a ROM, a RAM, a magnetic disk, or an optical disc.
- All or some of the foregoing embodiments may be implemented by using software, hardware, firmware, or any combination thereof.
- software is used to implement the embodiments, all or some of the embodiments may be implemented in a form of a computer program product.
- the computer program product includes one or more computer instructions.
- the computer may be a general-purpose computer, a special-purpose computer, a computer network, or another programmable apparatus.
- the computer instructions may be stored in a computer-readable storage medium or may be transmitted from a computer-readable storage medium to another computer-readable storage medium.
- the computer instructions may be transmitted from a website, computer, server, or data center to another web site, computer, server, or data center in a wired (for example, a coaxial cable, an optical fiber, or a digital subscriber line (DSL)) or wireless (for example, infrared, radio, or microwave) manner.
- the computer-readable storage medium may be any usable medium accessible by the computer, or a data storage device, such as a server or a data center, integrating one or more usable media.
- the usable medium may be a magnetic medium (for example, a soft disk, a hard disk, or a magnetic tape), an optical medium (for example, a DVD), a semiconductor medium (for example, a solid-state drive Solid State Disk (SSD)), or the like.
- a magnetic medium for example, a soft disk, a hard disk, or a magnetic tape
- an optical medium for example, a DVD
- a semiconductor medium for example, a solid-state drive Solid State Disk (SSD)
Abstract
Description
p=k n ×q n +k n-1 ×q n-1 +k n-2 ×q 1-2 + . . . +k 1 q 1 +k 0 (1), where
Claims (17)
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2017/104126 WO2019061204A1 (en) | 2017-09-28 | 2017-09-28 | Access control method and device |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2017/104126 Continuation WO2019061204A1 (en) | 2017-09-28 | 2017-09-28 | Access control method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
US20200229070A1 US20200229070A1 (en) | 2020-07-16 |
US11317338B2 true US11317338B2 (en) | 2022-04-26 |
Family
ID=65902529
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/829,884 Active 2037-11-30 US11317338B2 (en) | 2017-09-28 | 2020-03-25 | Access control method and apparatus |
Country Status (4)
Country | Link |
---|---|
US (1) | US11317338B2 (en) |
EP (1) | EP3678420A4 (en) |
CN (1) | CN111066346B (en) |
WO (1) | WO2019061204A1 (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113692032A (en) * | 2020-05-19 | 2021-11-23 | 华为技术有限公司 | Communication method and communication device |
CN114071646B (en) * | 2020-07-31 | 2023-04-07 | 维沃移动通信有限公司 | Access control method, device, terminal and network equipment |
EP4221351A4 (en) * | 2020-09-29 | 2023-11-01 | Guangdong Oppo Mobile Telecommunications Corp., Ltd. | Wireless communication method, terminal device, and network device |
CN112969177B (en) * | 2021-01-29 | 2023-03-14 | 展讯半导体(南京)有限公司 | Terminal access method and device, storage medium, access point, core network and terminal |
Citations (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101785336A (en) | 2007-08-17 | 2010-07-21 | 高通股份有限公司 | Access control for an AD-HOC small-coverage base station |
CN102045810A (en) | 2009-10-09 | 2011-05-04 | 华为技术有限公司 | Method, device and system for accessing machine type communication terminal equipment to network |
CN102469549A (en) | 2010-11-18 | 2012-05-23 | 中兴通讯股份有限公司 | Network access method and system |
CN103069869A (en) | 2010-08-13 | 2013-04-24 | 夏普株式会社 | Reducing congestion in wireless communication networks |
US8712469B2 (en) | 2011-05-16 | 2014-04-29 | Mindspeed Technologies U.K., Limited | Accessing a base station |
CN104378730A (en) | 2014-11-06 | 2015-02-25 | 中国电子科技集团公司第二十八研究所 | Access system for M2M service in cellular wireless communication system |
CN104581757A (en) | 2013-10-18 | 2015-04-29 | 中兴通讯股份有限公司 | M2M terminal initiative switching method and device in M2M network |
US20150173119A1 (en) * | 2013-12-13 | 2015-06-18 | Blackberry Limited | Managing Connection Retries Due To Access Class Barring |
US20150230094A1 (en) | 2014-02-10 | 2015-08-13 | Samsung Electronics Co., Ltd. | Method and apparatus for controlling network access according to ue capability and subscription information |
WO2015140274A1 (en) | 2014-03-21 | 2015-09-24 | Sony Europe Limited | D2d scheduling based on priorities |
WO2016077949A1 (en) | 2014-11-17 | 2016-05-26 | 华为技术有限公司 | Access control method, device and network equipment |
WO2016163745A1 (en) | 2015-04-06 | 2016-10-13 | 엘지전자 주식회사 | Method for selecting relay and transmitting/receiving signal through relay in wireless communication system and method therefor |
EP3094137A1 (en) | 2015-05-11 | 2016-11-16 | HTC Corporation | Device for handling system information |
CN106255112A (en) | 2016-08-19 | 2016-12-21 | 杭州迪普科技有限公司 | Wireless local area network access method and device |
US20170006043A1 (en) | 2015-07-02 | 2017-01-05 | Bin Da | Area restricted access system, method and non-transitory computer-readable storage medium |
CN106792983A (en) | 2017-01-03 | 2017-05-31 | 北京邮电大学 | A kind of connection control method and system |
CN107105482A (en) | 2017-06-06 | 2017-08-29 | 深圳市乃斯网络科技有限公司 | Terminal wifi connection control methods and system |
US9913181B1 (en) * | 2015-08-26 | 2018-03-06 | Sprint Spectrum L.P. | Reference signal power variation to indicate load information |
US20180310228A1 (en) * | 2016-08-17 | 2018-10-25 | Telefonaktiebolaget Lm Ericsson (Publ) | Risk aware validity assessment of system information |
US20200221500A1 (en) * | 2017-06-19 | 2020-07-09 | China Mobile Communication Co., Ltd Research Institute | Access method, network device, and mobile communication terminal |
-
2017
- 2017-09-28 CN CN201780094731.9A patent/CN111066346B/en active Active
- 2017-09-28 WO PCT/CN2017/104126 patent/WO2019061204A1/en unknown
- 2017-09-28 EP EP17927016.0A patent/EP3678420A4/en active Pending
-
2020
- 2020-03-25 US US16/829,884 patent/US11317338B2/en active Active
Patent Citations (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101785336A (en) | 2007-08-17 | 2010-07-21 | 高通股份有限公司 | Access control for an AD-HOC small-coverage base station |
CN102045810A (en) | 2009-10-09 | 2011-05-04 | 华为技术有限公司 | Method, device and system for accessing machine type communication terminal equipment to network |
CN103069869A (en) | 2010-08-13 | 2013-04-24 | 夏普株式会社 | Reducing congestion in wireless communication networks |
CN102469549A (en) | 2010-11-18 | 2012-05-23 | 中兴通讯股份有限公司 | Network access method and system |
US8712469B2 (en) | 2011-05-16 | 2014-04-29 | Mindspeed Technologies U.K., Limited | Accessing a base station |
CN104581757A (en) | 2013-10-18 | 2015-04-29 | 中兴通讯股份有限公司 | M2M terminal initiative switching method and device in M2M network |
US20150173119A1 (en) * | 2013-12-13 | 2015-06-18 | Blackberry Limited | Managing Connection Retries Due To Access Class Barring |
US20150230094A1 (en) | 2014-02-10 | 2015-08-13 | Samsung Electronics Co., Ltd. | Method and apparatus for controlling network access according to ue capability and subscription information |
WO2015140274A1 (en) | 2014-03-21 | 2015-09-24 | Sony Europe Limited | D2d scheduling based on priorities |
CN104378730A (en) | 2014-11-06 | 2015-02-25 | 中国电子科技集团公司第二十八研究所 | Access system for M2M service in cellular wireless communication system |
WO2016077949A1 (en) | 2014-11-17 | 2016-05-26 | 华为技术有限公司 | Access control method, device and network equipment |
WO2016163745A1 (en) | 2015-04-06 | 2016-10-13 | 엘지전자 주식회사 | Method for selecting relay and transmitting/receiving signal through relay in wireless communication system and method therefor |
EP3094137A1 (en) | 2015-05-11 | 2016-11-16 | HTC Corporation | Device for handling system information |
US20170006043A1 (en) | 2015-07-02 | 2017-01-05 | Bin Da | Area restricted access system, method and non-transitory computer-readable storage medium |
US9913181B1 (en) * | 2015-08-26 | 2018-03-06 | Sprint Spectrum L.P. | Reference signal power variation to indicate load information |
US20180310228A1 (en) * | 2016-08-17 | 2018-10-25 | Telefonaktiebolaget Lm Ericsson (Publ) | Risk aware validity assessment of system information |
CN106255112A (en) | 2016-08-19 | 2016-12-21 | 杭州迪普科技有限公司 | Wireless local area network access method and device |
CN106792983A (en) | 2017-01-03 | 2017-05-31 | 北京邮电大学 | A kind of connection control method and system |
CN107105482A (en) | 2017-06-06 | 2017-08-29 | 深圳市乃斯网络科技有限公司 | Terminal wifi connection control methods and system |
US20200221500A1 (en) * | 2017-06-19 | 2020-07-09 | China Mobile Communication Co., Ltd Research Institute | Access method, network device, and mobile communication terminal |
Non-Patent Citations (5)
Title |
---|
3GPP TS 36.331 V14.4.0:"3rd Generation Partnership Project; Technical Specification Group Radio Access Network; Evolved Universal Terrestrial Radio Access (E-UTRA); Radio Resource Control (RRC); Protocol specification (Release 14)",Sep. 2017,total 354 pages. |
Alcatel-Lucent, Alcatel-Lucent Shanghai Bell, Coverage Enhancement Targets. 3GPP TSG RAN WG1 Meeting #79, San Francisco, USA, 17th Nov. 21, 2014, R1-144695, 3 pages. |
Huawei (Rapporteur), 36.331 Running CR to capture agreements on NB-loT. 3GPP TSG-RAN WG2#93BIS Meeting, Dubrovnik, Croatia, Apr. 11-15, 2016, R2-163054, 61 pages. |
Jin Yang et al., LTE Field Performance for loT Applications. 2016 IEEE 84th Vehicular Technology Conference (VTC-Fall), Mar. 20, 2017, 5 pages. |
Zhao Jia, Research on Association Control and Mobility in Heterogeneous Networks. Xidian University, 2016, 1 page. |
Also Published As
Publication number | Publication date |
---|---|
CN111066346A (en) | 2020-04-24 |
EP3678420A1 (en) | 2020-07-08 |
EP3678420A4 (en) | 2020-09-16 |
US20200229070A1 (en) | 2020-07-16 |
WO2019061204A1 (en) | 2019-04-04 |
CN111066346B (en) | 2022-03-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11856518B2 (en) | Apparatus and methods for signaling in power save mode | |
US10383035B2 (en) | Providing and obtaining system information for remote wireless terminal | |
US11626952B2 (en) | Signal configuration method and related device | |
US11812475B2 (en) | Wireless resource allocation method and apparatus | |
US11317338B2 (en) | Access control method and apparatus | |
EP3358777B1 (en) | Method, base station, terminal and system for transmitting system information | |
US20210168810A1 (en) | Resource Configuration Method and Apparatus | |
US10939410B2 (en) | Communication method, user equipment, and network device | |
US10165624B2 (en) | Method and system for operating coverage-limited devices | |
WO2017140275A1 (en) | System and method of user equipment state configurations | |
US10631280B2 (en) | Variable subband configuration of search space | |
US20210258922A1 (en) | Resource configuration method and apparatus | |
KR102360462B1 (en) | Method, device and communication system for transmitting and acquiring system information | |
KR20230024397A (en) | Initial access method and device, terminal and network-side equipment | |
JP2021519553A (en) | Transport block size selection for early data transmission | |
US10887827B2 (en) | Communication message sending method and apparatus based on backoff duration | |
US20220117005A1 (en) | Random access method, user equipment, and storage medium | |
CN113923750A (en) | Method and device for accessing cell | |
CN117716726A (en) | Information processing method, communication device, and storage medium | |
CN117676775A (en) | Communication method and device | |
CN113518426A (en) | Communication method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
FEPP | Fee payment procedure |
Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
AS | Assignment |
Owner name: HUAWEI TECHNOLOGIES CO., LTD., CHINA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:WANG, HONG;QUAN, WEI;REEL/FRAME:052839/0231 Effective date: 20200530 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: AWAITING TC RESP., ISSUE FEE NOT PAID |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT VERIFIED Free format text: AWAITING TC RESP, ISSUE FEE PAYMENT VERIFIED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: AWAITING TC RESP, ISSUE FEE PAYMENT VERIFIED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT VERIFIED |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |